Presentation of the Trustless Computing Certification Proposal to the EU Parliament LIBE Committee Secretariat and to the European Data Protection Supervisor

Today, February 10th 2016, we are in Bruxelles, invited for a presentation of policy implications and proposals of our Trustless Computing Certification Campaign in two 1.5 hours meetings with key EU institutions:

  • Four top official of the EU Parliament LIBE Committee

  • The Head of IT Policy (Achim Klabunde) and the Deputy Supervisor (Wojciech Wiewiórowski) of European Data Protection Supervisor

Our proposal to EDPS and to the EU Parliament LIBE Committee was detailed in:

  • Ad hod slides introducing the Trustless Computing Certification Campaign,and the wider Trustless Computing Initiative. (pdf)

  • The 2-pager Section 3 “Desirable impacts on public policy in EU and beyond” of our live draft The Trustless Computing Certification Proposal (Live gdoc, or pdf).

    In synthesis, we proposed them to join a multi-stakeholder process – including members of Sogis and other EU and MS agencies devoted to state security – for the promotion and facilitation of – primarily non-governmental, but citizen-accountable – processes leading to new standard setting and certification bodies for end-2-end IT services  of ultra-high user trustworthiness, through the modification of existing EU standardization bodies to the extent that it is feasible.

   The Trustless Computing Certification Campaign is constituted of the synergic interplay of our Free and Safe in Cyberspace global event series (with key experts and institutions) and our draft proposal (draft PartB1-3 gdoc and PartB4-5gdoc) to H2020 DS-01 CSA Assurance and Certification for Trustworthy and Secure ICT systems, services and components, due in April 2016, as well as a set of 4-19M€ R&D proposals to create a related open target architecture.  The proposed standards and bodies aim to give citizens and public institutions a constitutionally-meaningful assurance of the fact that – non only legislations and their state oversight –  but also that ALL technologies and processes criticallyinvolved in operation and lifecycle of any end-2-end IT experience, comply to theEU Charter of Fundamental Rights.

Rufo Guerreschi